DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Panda Security Greece Hacked, Defaced by Turkish Ajan Hacker Group

Posted on December 20, 2012 by Lee J

panda_logo Hackers from the collective Turkish Ajan Hacker Group have managed to breach one of the giants in web security software, panda security  the attack comes from two members using the handles qoestebek & Renas1. The breach is on the main Greece based website ( pandasecurity.gr ) for panda as well as its software domain which now redirects to its main domain  ( pandasecurity.com ). At time of publishing the sites had been restored as this attack happened a few days ago. Mirrors for the defacement’s can be found on Zone-H. zonehmirrors-net-defaced-2012-12-16-pandasoftware-gr-xx-html Its not the first time panda has been hacked either, with previous data leaks, defacements and tango downs on many different servers over the past year and even back in 2011. See here. https://pandasoftware.gr/index.php https://zone-h.org/mirror/id/18754150 https://www.pandasecurity.gr/ https://zone-h.org/mirror/id/18754928 All other articles on Turkish Ajan Hacker Group.


Related:

  • Large medical lab in South Africa suffers multiple data breaches
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • NHS providers reviewing stolen Synnovis data published by cyber criminals
  • Fourth Circuit Weighs in on Standing in Data Breach Class Actions
  • Is your cyberinsurance paid up? Are you sure?
  • Software dev accidentally leaks Australian govt documents
Category: Breach Incidents

Post navigation

← CIA Laptop hacked, terrorist, CIA docs leaked & DHS XSS
Updates on CIA terrorist document leaks →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Marquis data breach impacts over 74 US banks, credit unions
  • Virginia Twins Arrested for Conspiring to Destroy Government Databases
  • Cyberattack on Puerto Rico IT vendor Truenorth hits 3 agencies
  • Easy Question, Complicated Answer: What Does It Take to Stop Workers From Snooping?
  • Update on Dos-OP’s report on Nova RaaS
  • KR: Privacy Commissioner’s Office Urges the Public to Beware of Fraudsters Exploiting the Tai Po Fire Disaster
  • Cyber attack on Indian airports? Govt explains the scary threat that disrupted 400 flights last month.
  • How a noisy ransomware intrusion exposed a long-term espionage foothold
  • KR: Hacking scheme targeted 120,000 home cameras for sexual footage
  • GreyNoise launches free scanner to check if you’re part of a botnet

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • EU justice chief draws red line on privacy reforms
  • Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit
  • How Palantir shifted course to play key role in ICE deportations
  • U.S. Judge Blocks Trump From Cutting Medicaid Funding For Planned Parenthood In 22 States
  • India backs off mandatory ‘cyber safety’ app after surveillance backlash

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.